Assuring performance of external storage systems
In a system having an internal storage system and an external storage system, a technique is provided for allowing the external storage system to inherit performance parameters from the internal storage system. Management tables are established in each of the two storage systems, and data pertaining to desired operational characteristics stored in the management table in the internal storage system. That information is transferred to the external storage system and used control its operations in accordance with the desired performance parameter.
Latest Hitachi, Ltd. Patents:
- Management system and management method for managing parts in manufacturing made from renewable energy
- Functional sequence selection method and functional sequence selection system
- Board analysis supporting method and board analysis supporting system
- Multi-speaker diarization of audio input using a neural network
- Automatic copy configuration
This invention relates to storage systems, and in particular to techniques of assuring appropriate performance of external storage systems coupled to local storage systems, for example, in situations where storage controller based virtualization is employed.
Large organizations throughout the world now are involved in millions of transactions which include enormous amounts of text, video, graphical and audio information. This information is being categorized, stored, accessed, and transferred every day. The volume of such information continues to grow. One technique for managing such massive amounts of information is to use storage systems. Commercially available storage systems include large numbers of hard disk drives operating under various control mechanisms to record, mirror, remotely backup, and reproduce this data. The rapidly growing amount of data requires most companies to manage the data carefully with their information technology systems, and to assure appropriate performance within such systems.
One common occurrence in the management of such data is the need to assure its preservation by making remote copies of the information in a location away from a primary or production site. Maintaining such records in a remote site helps assure the owner of the data that the data will be available even if there are natural disasters or other unexpected events which occur at the primary site and destroy the data there. By having stored the data in a remote location, protection is also provided in the event of failures in the primary storage system, as well as other events. Should an event occur at the primary site, the data from the remote copy operation can be retrieved and replicated for use by the organization, thereby preventing data loss or the need to recreate the data at considerable cost and delay.
With an appropriate schedule (either synchronously or asynchronously) with host operations changing data at the primary site, the data at the remote site (the “remote copy”) is also updated via a communications network. The network can be dedicated to the transmission of data between the primary site and the remote site, use the Internet, or by other means. Of course, because the remote site is, by definition, located at a distance from the primary site to provide enhanced data protection, there is a delay between the time the data is stored at the primary site and the time the data is transmitted to and stored at the remote site. Depending upon the bandwidth of the connection and the particular equipment at the remote site, this delay can be significant. Examples of storage-based remote copy technology as provided by leading vendors are Hitachi TrueCopy™, EMC SRDF™, and IBM PPRC™.
In many such systems the remote site will have what is referred to as an external storage system, that is, a storage system which is not connected to the host at the primary site, but instead is connected to a host at the secondary site. This can allow priority conflicts to occur which prevent the data at the secondary site from being as current as the host at the primary site would like.
Virtualization of storage systems is becoming more widespread. Controller based virtualization is one of the typical ways to provide this functionality. In controller based virtualization, the storage controller presents the external storage system as a virtual system to the host. A typical mechanism for achieving this is described in U.S. Pat. No. 6,529,976 entitled “Heterogeneous Computer System, Heterogeneous Input Output System and Data Back-Up Method For The Systems,” which is commonly assigned with this application.
Various techniques have been provided for attempting to assure the performance of storage systems. Prioritized port control (PPC) is one example. In PPC a mechanism is provided to define priorities, such as throughput, for some accesses. Because the prioritized accesses do not have any limitation to the logical unit or port, non-prioritized accesses have reduced throughput, helping assure that the prioritized accesses meet the desired standard. A detailed mechanism for achieving this is described in “Prioritized Port Control: Hitachi Freedom Storage Lightning 9900V Series, Priority Access User's Guide, page 3-13.
Another example of a known performance assuring mechanism is cache logical partitioning (CLPAR). In general, the cache memory in a storage system is shared by all write operations. By using CLPAR, however, some amount of the cache on the storage system can be reserved, or partitioned, for specific access to a logical unit.
Another example of a mechanism for helping assure desired performance is the SCSI “RESERVATION” command. Once “reservation” is set for a particular logical unit by an application, the SCSI commands from other applications are restricted. A more detailed explanation of that mechanism can be found at “SCSI RESERVATION command: T10 draft: SCSI-2 Small Computer System Interface, pages 189-192.” Unfortunately, none of the above described techniques is operable in the context of an external storage system.
What is needed, however, is a technique by which external storage systems can be managed in a manner to enable their performance to be reliably controlled, and a specified measure of performance achieved.
BRIEF SUMMARY OF THE INVENTIONThis invention provides a technique for assuring the performance, not only of storage systems directly connected to a particular host, but also of assuring the performance of external storage systems which are not directly connected to the host. These external storage systems are sometimes coupled to their own host, but are able to be involved in the storage of data provided from a primary location by techniques referred to as storage virtualization.
Preferably performance is controlled by providing mechanisms by which the performance parameter set in the primary storage system directly connected to the host, can also be forwarded to the external storage system. In such architectures typically two storage systems are provided, with a first system connected to the host and a second system providing the external storage. In some implementations a third system is added, with the second system connected to both the first and the third storage systems. Typically each of the first and second storage systems will have techniques for managing storage devices within the second and third storage subsystems as being part of the virtual storage device. The invention also provides a means for assuring quality of service for the host coupled to the first storage system.
In a preferred embodiment in a system having an internal storage system and an external storage system, a method is provided for allowing the external storage system to inherit parameters from the internal storage system. The method establishes in the internal storage system a first management table which includes, for at least one virtual logical storage unit, a performance parameter associated with storage system operations and a designation for the at least one virtual logical storage unit that a storage volume containing the virtual logical storage unit is physically present in the external storage system. In the external storage system, a second management table for the storage volume containing the virtual logical storage unit which is physically present in the external storage system is also established. Data is then transferred from the first management table to the second management table, and the external storage system is operated in accordance with the performance parameter transferred from the internal storage system.
Within storage controller 2100, a CPU 2001, memory 2002 and a cache memory 2003 are provided. The service processor 2006 manages the operation of the storage system. The storage controller also includes host interfaces such as channel adapters 2004 and external storage interfaces 2008. A network interface card 2007 couples the storage controller to a local area network, or other communications interface.
In operation the CPU 2001 processes I/O requests or performs other operations involving data stored in memory 2002. Typically CPU 2001 executes a stored program. In general, cache memory 2003 stores write data from the host computer 1000 on a temporary basis before the data is stored into the storage devices 2200. In addition, the cache 2003 can store the read data that are requested by the host 1000. Cache memory 2003 is usually a non-volatile memory, which may be backed up with a battery. In some implementations, however, memory 2002 and cache memory 2003 can be combined into a single memory.
A host interface 2004 connects between the host 1000 and the storage system 2000, for example, using a Fibre Channel or Ethernet protocol. The hard disk drives, or other storage media, are connected to the controller through disk interfaces 2005. An external storage interface 2008 connects between the storage system 2000 and an external storage system 3000, typically situated at a location remote from storage system 2000 to provide disaster recovery capability. The remote system 3000 also may be coupled to the local system 2000 using Fibre Channel, Ethernet, or other desired communication means. Service processor 2006 enables setting and changing the configuration of the storage system 2000. The storage 2200 itself, in high performance systems, will typically comprise an array of SCSI hard disk drives.
An external or remote storage system 3000 typically is connected to the local or primary storage system 2000 using a channel interface 3004. Often the configuration of the external storage system 3000 will be similar to that of storage system 2000, although the performance of such a system, for example its I/O speed, memory size, and all other parameters can be different from the specific parameters used in system 2000. In addition, system 3000 will often be coupled to its own host in the remote location for processing storage requests from that host. The configuration of hosts and storage systems depicted in
In the first implementation of the invention, a technique for providing prioritized port control to the external storage system is provided. This will be explained in conjunction with
A typical volume management table is depicted in
Other information also can be registered in the volume management table. In the diagram, LUN1 on storage system 2000 is a real volume, meaning that I/O operations are processed in this volume, and not forwarded to the external system 3000. On the other hand LUN2 on storage system 2000 is a virtual volume. This means that I/O operations to LUN2 are forwarded to the external storage system 3000. Both LUN1 3200 and LUN3 3201 on storage system 3000 are real volumes. LUN3 3201 is associated with virtual volume 2201. Thus, data written on LUN2 2201 are forwarded to LUN3 3201 at an appropriate time (which can be synchronous or asynchronous with the writing of volumes in storage system 2000 depending upon the particular implementation.) It is possible to forward every operation, or to store several operations and then forward the stored operations.
In
In
In the system described immediately above with respect to
Next, at step 5101 the PPC module registers these parameters in a new priority management table such as depicted in
If an Ext column is present, flow shits to step 5013 and the Ext column is filled with information according to the information from the volume management table as used by the external storage management module. If there is only a local volume a “No” is provided (meaning no management of an external storage system is required), while if there is an external volume, a “Yes” is provided. The worldwide name and LUN of the external storage are also provided. (Of course the Ext column is not essential for implementing the system described herein.) Without the Ext column, the PPC module can check to see if the volume is an external volume or not each time by searching the volume management table, although this does introduce additional overhead and delay.
In the next step 5104, the PPC module checks the Ext column associated with the priority setting requests from the application. If the column is “Yes” control moves to step 5105 and if “No” to step 5017. The yes entry in the external column indicates that the LUN is a virtual volume. This causes the PPC module to forward the priority parameters by calling the PPC module in the external storage system. Then the local virtual volume LUN is translated into a corresponding physical LUN in the external system. The SCSI command can be used to perform this operation. When the PPC module on the external storage system receives the request, the priority setting process begins from step 5100.
In this implementation the use of a storage management server or storage management network to transmit the priority is not assumed. This means so-called “in band” communication can be used. Alternatively, however, if a server is used, the PPC module can send the priority information to the server, and then the server can send that information to the external PPC module.
At step 5107 the PPC module finishes its configuration operations except for registration in the PMT table. When the priority setup process finishes, the result (success or fail) is returned to the host or storage system. Thus, if a PPC module does not exist on the external storage system, process 5105 will fail. The existence of the PPC module can be specified in advance, for example as being set by an administrator or user of the storage system. Alternatively the PPC module can call the remote PPC module, and if there is no response, the module can return a fail signal.
In an alternative technique, the storage management server can be used to set the priority of the external storage system through a management interface. This can be done manually by giving the storage manager the ability to set up the priority for both the virtual volume LUN2 2201 and the real volume LUN3 3201. This approach, however, requires more communications among the storage systems and storage management servers, and requires the operations to and from the host to all be made known to the storage management server.
The foregoing has been a description of a prioritized port control system for implementation with external storage systems. Next, an explanation is provided of how the cache LPAR system configuration settings can be inherited in a similar manner. This description uses the same volume configuration as shown in
In
Accesses from other applications to some LUNs are not reserved. These accesses then must use the shared area of a cache memory, which may impact performance depending on the particular timing of the accesses. For the cache reservation parameters, not only is the absolute size of the cache memory a possible choice, but also the ratio of cache memory size can be used. For example, one-third of the cache can be reserved for a particular application. The cache reservation information is stored in management table 2061, and typically includes the worldwide name representing the host or application, the logical unit number, and the size of the reservation. Of course, other information can also be registered in this table 2061. Based upon the information in the table, CLPAR module 2060 monitors I/O operations from the applications program and controls the usage of the cache. In a similar manner, in storage system 3000, a management table 3061 has reserved one gigabyte of the cache for accesses to LUN1, associated with applications program 1024.
The cache capacity reservation for LUN2 which is a virtual storage volume, however, cannot be inherited by the external storage 3000. Thus, accesses from LUN2 2201 on storage system 2000 to LUN3 3201 on storage system 3000 through the channel do not include cache reservations.
To start the process, the CLPAR module is invoked by an application program on a host or another storage system to set up the cache LPAR. This is shown at step 5200. In this process, parameters are passed from the application system to the CLPAR module. Typically the parameters include the worldwide name of the host upon which the application resides, the logical unit number which the application accesses, and the cache capacity for the access. At step 5201 the CLPAR module checks to determine if there is enough capacity in the cache for the reservation. If there is not, an error is reported at step 5209. Assuming there is enough capacity for the reservation requested, the module registers the information into the cache management table at step 5200.
In a similar manner to the steps described above for controlling port priority, the system then checks to determine whether there is a column “Ext,” as shown by step 5203. If there is, the column is filled according to the information from the volume management table which is used by the external storage management module. See step 5204. For a local volume the column is set to “No,” while for an external column, the setting is “Yes.” The worldwide name and the logical unit number of the external storage are also provided as shown by step 5204. The module then checks the external column at step 5205 to determine subsequent operations. If the column is “Yes” this means the LUN is a virtual volume. In that case, the CLPAR module forwards the parameters by calling the CLPAR module on the external storage. Typically a SCSI command is used for this operation. In this case the virtual volume's logical unit number must be translated into the corresponding logical unit number in the external storage system by using the volume management table managed by the external storage management module. When the CLPAR module on the external storage receives the request, the cache LPAR setting process begins as shown by step 5206.
At step 5208 the CLPAR module finishes its configuration except for registering the data in the cache management table. The setup process then completes, and the result (success or fail) is returned to the host for the storage system. If the CLPAR module does not exist in the external storage system, the process at step 5206 fails. The presence or absence of the module is typically set in information provided by administrators or users of the storage system. Alternatively, if one module calls a remote module, and if there is no response or an error, then the CLPAR module returns information that the external module is not present.
Contrary to the prioritized port control operation, it is possible to cancel the CLPAR setting for the virtual volume, meaning that the cache is only reserved in the external storage. To do that, process 5206 receives a successful reply and the CLPAR module deletes the reservation information in the cache management table.
In an alternative approach, the storage management server may be used to set up the cache reservation through a management interface. In this approach, the storage manager sets the reservation for both virtual volume 2201 and real volume 3201 manually. Of course, it is also possible to set the parameters automatically, however this requires more communications between the storage system itself and the storage. In this case, all the operations to and from the host are storage system passed through the storage management server.
Another approach for assuring performance of external storage networks is to delegate the local copy operation to the external storage when both the source and destinations are present in the external storage. Herein this copy mechanism is referred to as “shadow imaging.”
In
Then at step 5303, a determination is made whether an external column has been already added to the CPMT. As described above with regard to the cache reservation system, this enables the system to interact with systems in which no Ext column is present. In this situation, the operation just proceeds as it would have before, without regard to an Ext column.
As shown in step 5305, if the Ext column exists, that column is completed according to the information in the volume management table 2040 which is used by the external storage management module. For a local volume, “No” is used meaning there is not an external volume, while for a “Yes” designates an external volume. The worldwide name and LUN of an external storage are also provided, all as shown at step 5304.
At step 5305 the module checks whether the Ext column associated with the LUNs are a pair. If both columns contain “Yes” it means that both LUNs are virtual volumes. In this case the shadow image module forwards the pair create command with the associated LUNs by calling the shadow image (SI) module on the external storage system. The LUNs are found in the volume management table managed by the external storage management module. A SCSI command can be used for this operation. When the SI module on the external storage receives the request, the pair create process starts from step 5300.
If it is desired to stop mirroring (split) or to handle other commands to the storage system which have virtual volumes, the SI can also register new status “Ext” in the status column for the pair as shown by step 5307. Once this step is completed, the SI module finishes its configuration for copy operations, except for the registration in the CPMT then the pair create process finishes. The result is returned to the host for storage system. As mentioned above, if the SI module does not exist on the external system, the process fails at step 5306. In this case the result is an error and the SI module cancels the registration information in the CPMT, as per step 5311. The process step 5311 can be omitted, and if so, then the mirroring between the virtual LUNs continues to work even if the shadow image operation fails.
In addition to the pair create operation, the split operation must also be forwarded to the external storage system. The conceptual diagram of this operation is shown in
During this process there is a possibility that data on the cache 2003 has yet to be written to the volume 2210. To prevent loss of this data, upon invoking the process, the data on the cache is flushed, ultimately to LUN 3210 on the external storage unit. Then the split operation is forwarded to the external storage and stored in the copy pair management table. The data flow as illustrated by
On the other hand, if the status check 5401 returns Ext as the status, this means both the source LUN and the destination LUN are on the remote storage system. In this case the shadow image module blocks input/output operations to the applicable LUNs from the applications 5405. Then the shadow image module flushes the cache data to the source LUN on the local storage system and to the remote cache on the external storage system, as shown by step 5406. Afterward, the module forwards the split command to the external storage system, as shown at step 5407. According to the external LUN information stored on the volume management table 2041 and CPMT 2071, the shadow image module will input the external LUNs in the forwarded split command. When the SI module receives the request, the split process begins at step 5400.
Finally, if the status command in neither “pair” nor “Ext,” the split command should not be processed and an error returned, as shown by step 5408. If the split process finishes and the SI module does not exist on the external storage system, the whole process fails. To check for the existence of the shadow image module, the module itself can manage the information about whether each storage is aware of the module or not, in advance. This information can be set by the storage administrator or users of the storage system. In an alternative approach the local SI module can call the remote SI module, and if there is no response or if an error is returned, the absence of the SI module can be inferred. In this situation, use of the management table 5409 can be employed.
After a pair is split, an SI command known as “resync” can be used to recreate the pair. This process is almost the same as the normal pair create operation discussed in conjunction with
It is also possible for the source and destination volumes to be on the external storage system. Furthermore, even if the source and destination volumes are virtual volumes on the same storage system, the corresponding real volumes can be present on different storage systems. A typical configuration is shown in
In
In the example depicted in
On the other hand, if the Ext column exists, it is supplied with information from the volume management table which is used by the external storage management module. If it is a local volume N is indicated, and of an external volume, Y is indicated. At step 5905 the SCSI command processing module checks the Ext column of the requested volume. If the column indicates “Y” meaning that the LUN is a virtual volume, the SCSI command processing module forwards the reservation command to the external storage. The associated LUN is found in the volume management table which is being managed by the external storage management module and is set in the forwarded SCSI reservation command. When the SCSI command processing module on the external storage receives this request, the reservation process begins.
Once the command processing module finishes configuring the reservation the result is returned to the host. If the external LUN has already been reserved, an error is returned. Assuming that it is not, then the reservation information is entered into the table and a result returned to the host or connected storage system. Note that it is possible to cancel the reservation setting for the virtual volume, meaning that the volume is only reserved in the external storage. To do that, after process 5906 is successful, the command processing module cancels the reservation information in the management table.
The forgoing has been a description of several embodiments of the invention. In this description numerous details have been provided for explanation. The scope of the invention is defined by the appended claims.
Claims
1. In a system having an internal storage system and an external storage system, a method for allowing the external storage system to inherit parameters from the internal storage system, the method comprising:
- establishing in the internal storage system a first management table, wherein the first management table includes performance management information relating to storage system operations, the performance management information including a performance parameter for a virtual logical storage unit in the internal storage system and a logical storage unit identifier identifying the virtual logical storage unit, wherein the virtual logical storage unit corresponds to a logical storage unit that is physically present in the external storage system, and wherein information in the first management table is used to operate a controller of the internal storage system;
- establishing in the external storage system a second management table for the logical storage unit that is physically present in the external storage system, information in the second management table being used to operate a controller of the external storage system;
- transferring the performance management information from the first management table to the second management table, including modifying the logical storage unit identifier in the transferred performance management information to identify the logical storage unit physically present in the external storage system that corresponds to the virtual logical storage unit; and
- operating the logical storage unit in accordance with the-transferred performance management information.
2. A method as in claim 1 wherein the first management table comprises a priority management table which defines priorities among the logical storage units in the internal storage system, and the step of transferring the performance management information comprises transferring an indication of whether the logical storage unit physically present in the external storage system has priority over other units in the external storage system.
3. A method as in claim 1 wherein the first management table comprises a cache management table which defines cache memory operations for the logical storage units in the internal storage system, and the step of transferring the performance management information comprises transferring an indication of an amount of cache memory reserved for use by the logical storage unit physically present in the external storage system.
4. A method as in claim 1 wherein the first management table comprises a copy pair management table which defines logical storage unit copy operations for the logical storage units in the internal storage system, and the step of transferring the performance management information comprises transferring logical storage unit copy configurations for the logical storage unit physically present in the external storage system.
5. A method as in claim 1 wherein the first management table comprises a reservation management table which defines restrictions to access of the logical storage units in the internal storage system, and the step of transferring the performance management information comprises transferring a parameter designating restrictions for accessing the logical storage unit physically present in the external storage system.
6. A method as in claim 1 wherein prior to the step of transferring the performance management information from the internal storage system to the external storage system a determination is made whether the second management table allows storage of parameters from the first management table.
7. A method as in claim 2 wherein the external storage system is coupled to a host, and wherein the second management table includes logical unit numbers for the storage associated with the external storage system, and further includes for at least one such logical unit number, an identification referencing the host having access to that logical unit number.
8. A method as in claim 7 wherein the logical unit numbers and the identification referencing the host having access to that logical unit number are stored in a table.
9. A method as in claim 8 wherein the table further includes information as to at least one of:
- whether there is a priority for communications between the host and that logical unit;
- whether an amount of cache memory has been assigned to that logical unit;
- whether that logical unit has been paired with another logical unit; and
- whether access to that logical unit has been reserved to a particular host.
10. A system comprising:
- an internal storage system including: a first management table which includes performance management information relating to storage system operations, the performance management information including a performance parameter for a virtual logical storage unit in the internal storage system and a logical storage unit identifier identifying the virtual logical storage unit, wherein the virtual logical storage unit corresponds to a logical storage unit that is physically present in an external storage system; and a controller for operating the internal storage system in accordance with the performance management information; and
- at least a temporary connection between the internal storage system and the external storage system,
- wherein the performance management information is transferred from the first management table to a second management table in the external storage system, wherein the logical storage unit identifier in the transferred performance management information is modified to identify the logical storage unit physically present in the external storage system corresponding to the virtual logical storage unit, and wherein the logical storage unit is operated in accordance with the transferred performance management information.
11. A system as in claim 10 wherein the first management table comprises a priority management table which defines priorities among the logical storage units in the internal storage system, and wherein the performance parameter comprises an indication of whether the logical unit physically present in the external storage system has priority over other units in the external storage system.
12. A system as in claim 10 wherein the first management table comprises a cache management table which defines cache memory operations for the logical storage units in the internal storage system, and wherein the performance parameter comprises an indication of an amount of cache memory reserved for use by the logical storage unit physically present in the external storage system.
13. A system as in claim 10 wherein the first management table comprises a copy pair management table which defines logical storage unit copy operations for the logical storage units in the internal storage system, and wherein the performance parameter comprises logical storage unit copy configurations for the logical storage unit physically present in the external storage system.
14. A system as in claim 10 wherein the first management table comprises a reservation management table which defines restrictions to access of the logical storage units in the internal storage system, and wherein the performance parameter comprises a parameter designating restrictions for accessing the logical storage unit physically present in the external storage system.
15. A system as in claim 11 wherein the external storage system is coupled to a host, and wherein the second management table includes logical unit numbers for the storage associated with the external storage system, and further includes for at least one such logical unit number, an identification referencing the host having access to that logical unit number.
16. A system as in claim 15 wherein the logical unit numbers and the identification referencing the host having access to that logical unit number are stored in a table.
17. A system as in claim 16 wherein the table further includes information as to at least one of:
- whether there is a priority for communications between the host and that logical unit;
- whether an amount of cache memory has been assigned to that logical unit;
- whether that logical unit has been paired with another logical unit; and
- whether access to that logical unit has been reserved to a particular host.
18. A method performed by a system comprising an internal storage system and an external storage system, the internal storage system including a first cache for caching data accesses to logical storage units in the internal storage system, the external storage system including a second cache for caching data accesses to logical storage units in the external storage system, the method comprising:
- receiving, at the internal storage system, a request to reserve a portion of the first cache for data accesses to a first logical storage unit in the internal storage system;
- in response to the request, storing a first set of cache reservation parameters in a cache management table of the internal storage system, the first set of cache reservation parameters including a cache reserve size and an identifier of the first logical storage unit;
- identifying the first logical storage unit as a virtual logical storage unit, wherein data for the first logical storage unit is physically stored in a second logical storage unit resident in the external storage system;
- forwarding the first set of cache reservation parameters from the internal storage system to the external storage system;
- translating, at the external storage system, the first set of cache reservation parameters into a second set of cache reservation parameters, the translating comprising translating the identifier of the first logical storage unit into an identifier of the second logical storage unit; and
- storing the second set of cache reservation parameters in a cache management table of the external storage system, thereby reserving a portion of the second cache for data accesses to the second logical storage unit.
4679153 | July 7, 1987 | Robinson et al. |
6529976 | March 4, 2003 | Fukuzawa et al. |
20030188114 | October 2, 2003 | Lubbers et al. |
- Hitachi Freedom Storage Lightning 9900 V Series Priority Access (Prioritized Port Control) User's Guide, Hitachi Data Systems, 2002.
- Hitachi Freedom Storage Lightning 9900V Series, Performance Monitor (Performance Management) User's Guide, p. 3-13, Hitachi Data Systems, 2002.
- “SCSI Reservation command: T10 draft: SCSI-2 Small Computer System Interface,” working draft from INCITS Technical Committee T10 available at www.t10.org, pp. 189-192 (Apr. 1996).
- Harris et al. “LPAR Configuration and Management Working with IBM @server iSeries Logical Partitions,” IBM Redbook, p. 1-13 (Apr. 2002).
Type: Grant
Filed: Apr 15, 2005
Date of Patent: Jan 27, 2009
Patent Publication Number: 20060236060
Assignee: Hitachi, Ltd. (Tokyo)
Inventors: Hidehisa Shitomi (Mountain View, CA), Yoshiki Kano (Sunnyvale, CA)
Primary Examiner: Matt Kim
Assistant Examiner: John P Fishburn
Attorney: Mattingly, Stanger, Malur & Brundidge, PC
Application Number: 11/107,598
International Classification: G06F 12/00 (20060101);